Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Entire DC Network

Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola Jan 2022

Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola

Walden Dissertations and Doctoral Studies

Small and medium-scale enterprises contribute 49% of the gross domestic product in Nigeria. The lack of research studies on how small and medium-scale enterprises integrate corporate sustainability into their business operations might present challenges for policymakers in achieving Nigeria’s sustainable development goals (SDG). The purpose of this descriptive phenomenological study was to explore how managers of small and medium-scale enterprises integrate the corporate sustainability dimensions into their business operations based on the concepts of the corporate entity, corporate nature, and corporate obligations. The central research question of this study was how managers of small and medium-scale enterprises integrate the economic, …


Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger Jan 2022

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger

Walden Dissertations and Doctoral Studies

AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …


Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte Jan 2022

Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte

Walden Dissertations and Doctoral Studies

Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …


Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore Jan 2022

Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore

Walden Dissertations and Doctoral Studies

Many information technology (IT) managers have experienced challenges retaining high-tech professionals. Organization leaders lose investments of time and money when essential personnel leave. Grounded in the task-technology fit theory and the technology acceptance model, the purpose of this qualitative multiple-case study was to explore technology-focused strategies IT managers use to attract and retain IT professionals. The participants included five IT managers from five high-tech organizations who implemented strategies to attract and retain IT professionals. Data were collected from semistructured interviews and online resources. Thematic analysis revealed four themes: (a) using high-tech tools and alternative methods, (b) employing talent management techniques, …


Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau Jan 2022

Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau

Walden Dissertations and Doctoral Studies

Approximately 84% of North American individual contributors work in organizations with functionally specialized structures where task uncertainty (TU) and task interdependence (TI) undermine cross-functional task execution. However, there is a lack of research into the TU and TI experiences of individual contributors under different organizational structures. It is important that senior leaders have this missing knowledge to inform structural decisions. The purpose of this generic qualitative, exploratory, snowball sampling study is to explore how individual contributors experience TU and TI following a reorganization from a functional to a horizontal organizational structure. In the current study, the research questions explored were …


Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri Jan 2022

Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri

Walden Dissertations and Doctoral Studies

Many multiproduct delivery organizations have difficulty adopting Information Technology (IT) governance practices within their Development and Operations (DevOps) teams. IT leaders who are managing DevOps teams, need to understand the factors influencing IT governance (ITG) adoption; otherwise this may impact DevOps maturity, resulting in reduced product delivery capabilities. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine the relationship between performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC), as moderated by experience (EXP), gender (GND), age (AGE), and voluntariness of use (VOL) with behavioral intention (BI) to adopt …


Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner Jan 2022

Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner

Walden Dissertations and Doctoral Studies

Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures. Grounded in routines activity theory (RAT), the purpose of this qualitative exploratory multiple case study was to explore strategies cybersecurity analysts use to defend critical infrastructures from APT attacks. Data were collected through interviews with 8 participants and documents from two organizations. Participants were required to have experience analyzing network traffic on a critical infrastructure network, one year of cyber threat hunting experience, prior or current knowledge of cyber threat intelligence …


Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore Jan 2022

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore

Walden Dissertations and Doctoral Studies

Chip-and-Personal Identification Number (PIN) technology is seen as a game changer in many e-commerce industries and a transformational technology in the 21st century. However, security concerns have made chip-and-PIN adoption relatively slow. Massive unauthorized card payment transactions in the United States (U.S.) cost victims an estimate totaling billions of dollars. Information Technology (IT) managers are concerned with credit card fraud's financial loss and liability cost. Grounded in Rogers’s diffusion of innovation theory, the purpose of this qualitative pragmatic study was to explore strategies used by IT managers to transition their e-commerce organizations to chip-and-PIN credit card authentication infrastructures. The participants …


Forward-Looking Strategies For Safely Adopting Digital Transformation In Aviation, Melissa King Jan 2022

Forward-Looking Strategies For Safely Adopting Digital Transformation In Aviation, Melissa King

Walden Dissertations and Doctoral Studies

Aviation leaders in the U.S. federal government face challenges in adopting technical evolution and advancing modernization while adhering to the rigor of a deeply entrenched safety culture. The purpose of this qualitative modified Delphi study was to determine how a panel of 21 aerospace experts based in Washington, DC viewed strategies for adopting to new technologies while ensuring safety. The management concepts that framed the study were safety culture and digital transformation. The study addressed the research question of how a panel of aviation experts viewed the desirability, feasibility, and importance of forward-looking strategies for adopting digital transformation while adhering …


Relationship Between Information System Success Model Dimensions And Electronic Health Records Use, Gloria Oshegbo Jan 2022

Relationship Between Information System Success Model Dimensions And Electronic Health Records Use, Gloria Oshegbo

Walden Dissertations and Doctoral Studies

The rise in the use of electronic health records (EHRs) in health care facilities necessitates a standardized tool for evaluating their effectiveness. Delone and McLean’s information system success model (ISSM) was the theoretical foundation, which consists of seven dimensions namely system, information, service qualities, user satisfaction, use, system usefulness, and net benefits. The purpose of this study was to examine EHRs’ efficiency and identify ISSM dimensions that influenced net benefits, the dependent variable. The research questions examined the relationship between dimensions of ISSM and the dimensions that affect net benefits. Participants were recruited using purposeful sampling via social media and …


Digital Strategies To Improve The Performance Of Pharmaceutical Supply Chains, Manish Shashi Jan 2022

Digital Strategies To Improve The Performance Of Pharmaceutical Supply Chains, Manish Shashi

Walden Dissertations and Doctoral Studies

Some supply chain managers at pharmaceutical companies lack strategies to digitalize integrated supply chain systems impacting their profitability. Digitalized supply chain management in a pharmaceutical company can help reduce operation costs, improve assets, enhance shareholders’ value, positively respond to customer demand, and generate profits. Guided by the theory of constraints, the purpose of this qualitative multiple case study was to explore strategies some pharmaceutical managers use to digitalize integrated supply chain systems to increase their profitability. The participants were five managers from four pharmaceutical companies in New Jersey with strategies to digitalize their integrated supply chain systems. Data collection included …


Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam Jan 2022

Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam

Walden Dissertations and Doctoral Studies

The difficulty SME leaders of manufacturing firms experience in the executing of enterprise resource planning (ERP) systems threatens the longevity of innovative change within firms seeking to adopt ERP systems. Grounded in the diffusion of innovation theory, the purpose of this multiple case study was to examine critical success factors used to successfully implement ERP systems. The participants were four ERP business leaders of small to medium size manufacturing firms based on the east and west coasts of the United States. Data were collected using semistructured online interviews and a review of company documents. Through thematic analysis, five themes were …


Administrative Leaders’ Experiences With Information Communication Technology Platforms And Best Practices In Smart Schools, Byron B. Jackson Jan 2022

Administrative Leaders’ Experiences With Information Communication Technology Platforms And Best Practices In Smart Schools, Byron B. Jackson

Walden Dissertations and Doctoral Studies

Administrative leaders in traditional schools have failed to manage resources, implement best practices, and successfully integrate information communication technology (ICT) platforms into K-12 programs. The purpose of this qualitative, transcendental phenomenological study was to explore and discover the lived experiences of administrative leaders who have been successful in their integration of ICT platforms and best practices in K-12 smart schools. This study was framed by two concepts: (a) building digital capacity in smart schools and (b) ICT platforms integration in smart schools. Both concepts were theoretically grounded in social cognitive theory and system theory. Data were collected in semi structured …


Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa Jan 2022

Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa

Walden Dissertations and Doctoral Studies

In the United States, approximately 50% of small businesses fail within the first five years (Small Business Administration, 2018b). Small and medium sized enterprises (SMEs) owners and managers would benefit from strategies to identify and mitigate constraints to sustain their business beyond the first five years of business operation. Grounded in the system theory framework, the purpose of this qualitative multiple case study was to explore strategies leaders of small and medium sized enterprises (SMEs) in Austin, Texas, used to grow and sustain their business’s operations beyond five years. The participants were five small and medium sized businesses owners in …


Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez Jan 2022

Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez

Walden Dissertations and Doctoral Studies

Millions of Bitcoin transactions occur daily, worth nearly $2 billion annually. With the proliferation of cryptocurrency markets, the reluctance to adopt the currency as an alternate payment method could cause businesses to forgo growth opportunities within this expanding market. Grounded in the diffusion of innovation theory, the purpose of this qualitative multiple-case study was to explore strategies business leaders use to respond to the alternative payment concerns perpetuated by cryptocurrency markets. The participants comprised 6 business leaders who effectively employed cryptocurrency adoption strategies. Data were collected through semistructured interviews, corporate documents, and other company social media resources. Thematic analysis of …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Exploration Of Cybersecurity Managers’ Experiences Protecting Users’ Privacy, Emmanuel Abayomi Segun Jan 2022

Exploration Of Cybersecurity Managers’ Experiences Protecting Users’ Privacy, Emmanuel Abayomi Segun

Walden Dissertations and Doctoral Studies

The protection of individual privacy and personal data in cyberspace continues to be a problem. The research problem was that cybersecurity managers must constantly navigate between the adoption of new security laws, new applications, and the internet of things (IoT) to protect the privacy of individual users. The purpose of this descriptive phenomenological study was to explore the lived experiences of cybersecurity managers who have adopted new security laws, new applications, and the IoT to protect users’ privacy. The conceptual framework that grounded this study was protection motivation theory and cybersecurity awareness. Data were collected through telephone and web-based interviews …


Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens Jan 2022

Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens

Walden Dissertations and Doctoral Studies

Due to the recent coronavirus disease (COVID-19) pandemic, rapid technological innovation and nursing practice transformation exposed a deepening divide in the knowledge and awareness of information and communication technologies (ICT) among nurses. This technological skills gap undermines the benefits of ICT to nursing practice such as increased nurse satisfaction, improved care quality, and reduced costs. Nurse leaders are positioned to promote the use of ICT among nurses but may suffer from the same knowledge deficit of ICT as their followers. Guided by Locsin’s technological competencies as caring in nursing theory, Staggers and Parks’ nurse-computer interaction framework, and Covell’s nursing intellectual …


Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker Jan 2022

Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker

Walden Dissertations and Doctoral Studies

Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic …


Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela Jan 2022

Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela

Walden Dissertations and Doctoral Studies

Failure to implement new technology creates a barrier to success for small businesses. Small business owners must create competitive advantages by implementing new technology as there is a need to maintain an advantage when competing in the local market economy. Grounded in the human capital theory, the purpose of this qualitative multiple case study was to explore the employee training strategies small business owners use to implement new technology. The participants were five small business owners in Central Florida who used employee training strategies to implement new technologies Data were collected using (a) semistructured interviews, (b) member checking interviews, (c) …


Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams Jan 2022

Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams

Walden Dissertations and Doctoral Studies

Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …


Website Accessibility Strategies, Gary W. Hrezo Jan 2022

Website Accessibility Strategies, Gary W. Hrezo

Walden Dissertations and Doctoral Studies

Most websites cannot be readily used by people with disabilities, despite the internet being an essential component for people to be part of a community. Applying web accessibility strategies means that people with disabilities can better interact with the web. Grounded in Davis’s technology acceptance model, the purpose of this qualitative multiple case study was to examine strategies used by web designers to make websites accessible for people with disabilities. The participants were experienced web developers from organizations in Florida with websites that have a Web Content Accessibility Guidelines Level 2 of three levels, i.e., AA- rating. The data collection …


Social Media Analytics Use Among Small Business Owners, Melody White Jan 2022

Social Media Analytics Use Among Small Business Owners, Melody White

Walden Dissertations and Doctoral Studies

As of January 2018, small businesses created 47.5% of private jobs in the United States, but little is known about whether and why small business owners use social media analytics. This topic is important because social media analytics assist businesses in identifying social media effectiveness, gaining new customers, and staying connected with current customers. The purpose of this generic qualitative research study was to explore the use of social media analytics by small business owners, which can increase customer interaction and help monitor company perception and effectiveness. The conceptual foundation used in this study was the technology acceptance model. The …


Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks Jan 2022

Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks

Walden Dissertations and Doctoral Studies

Organizations that do not adequately protect sensitive data are at high risk of data breaches. Organization leaders must protect confidential information as failing to do so could result in irreparable reputation damage, severe financial implications, and legal consequences. This study used a multiple case study design to explore small businesses’ strategies for protecting their customers’ PII against phishing attacks. This study’s population comprised information technology (IT) managers in small businesses in Northern Virginia. The conceptual framework used in this study was the technology acceptance model. Data collection was performed using telephone interviews with IT managers (n = 6) as well …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Security Strategies Of Electronic Health Record Systems, Benjamin Gerke Jan 2022

Security Strategies Of Electronic Health Record Systems, Benjamin Gerke

Walden Dissertations and Doctoral Studies

Users of electronic health record (EHR) systems lack data security mechanisms and are at risk of patient data breaches. Grounded in routine activities theory, the purpose of this qualitative case study was to explore strategies information technology security managers in the health care industry use to minimize electronic health record data breaches. The participants were nine information security managers of large, medium, and small health care organizations in the Midwest United States. Data collection included semistructured interviews and organizational documents. Through methodological triangulation, three themes emerged: (a) requirements based on government and organizational regulations, (b) implementation of best practice industry-standard …


Modernization Of Legacy Information Technology Systems, Rabie Khabouze Jan 2022

Modernization Of Legacy Information Technology Systems, Rabie Khabouze

Walden Dissertations and Doctoral Studies

Large enterprises spend a large portion of their Information Technology (IT) budget on maintaining their legacy systems. Legacy systems modernization projects are a catalyst for IT architects to save cost, provide new and efficient systems that increase profitability, and create value for their organization. Grounded in sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies IT architects use to modernize their legacy systems. The population included IT architects in large enterprises involved in legacy systems modernization projects, one in healthcare, and one in the financial services industry in the San Antonio-New Braunfels, Texas metropolitan …


Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez Jan 2022

Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez

Walden Dissertations and Doctoral Studies

Online credit card fraud targeting banks, customers, and businesses costs millions of U.S. dollars annually. Online business leaders face challenges securing and regulating the online payment processing environment. Grounded in the situational crime prevention theory, the purpose of this qualitative multiple case study was to explore strategies online business leaders use to mitigate the loss of revenue caused by online credit card fraud. The participants comprised five online business leaders of an organization in the Southwest of the United States, who implemented strategies that successfully mitigated revenue losses due to online credit card fraud. The data were collected from semistructured …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …